Cisco acquired company that created what we know today as the Cisco Web Security Appliance (WSA) and the Cisco Email Security Appliance (ESA)
Ironprot
Cisco WSA and Cisco ESA can be managed by ?
This provides a solution for centralizing the management and reporting functions of multiple Cisco ESA and Cisco WSA devices
Cisco Security Management appliance (SMA)
This power Cisco WSA, ESA and SMA. It is based on freeBSD based kernel. This does not have a user UNIX Shell. Administrators can configure the system using a web admin portal (or web based) or a fully scriptable command-line interface (CLI)
Cisco Async Operating System (AsyncOS)
Different Web Security Appliance (WSA) feature engine
Cisco WSA typically placed either on the inside of the internet edge firewall or in a demilitarized zone. Cisco WSA have one or more of the following interface types
Two modes of deployment for Cisco WSA
On WSA traffic redirection can be done using?
PBR (policy based routing) on many routers
Cisco’s Web Cache Communication Protocol (WCCP) on Cisco ASA, routers and switches
Steps in configure WCCP in Cisco ASA to redirect web traffic to Cisco WSA
You can configure WCCP on a Cisco Firepower Threat Defence (FTD) device by using this. It is a container of an ordered list of FlexConfig objects.
Cisco Firepower Management Console (FMC) Flexconfig Policies
When Cisco WSA (a s web proxy) forward request, by default it changes the request source iP address to match it own IP. However you can change this by enabling ______ ?
Web proxy IP Spoofing
Policy type that you can enable in the Cisco WSA. This policies are configured to identify user behind the web request instead of just IP address
Identification policies
Cisco WSA provides different options for the AD or LDAP realm authentication. These are the available schemes
Authentication surrogates options enable you to configure how web transactions willbe associated with a user after the user has been successfully authenticated. Here are the options
This policies in WSA map the identification profile for users. also time-based restrictions
Access policies
Additional settings and customizations you can configure on WSA:
This can be deployed as physical or virtual appliance or cloud service. This acts as email gateway to organizations, controlling the transfer of all email connections, accepting messages and relaying messages to appropriate email servers. Can handle all email smtp connections
Cisco Email Security Appliance (ESA)
Most important email concepts
Used to route the mail traffic on the internet
DNS MX records.
Example of Cisco ESA deployment. Steps
Cisco ESA use this to handle incoming SMTP connection request. Determine the email processing service configured on a Cisco ESA interface
Cisco ESA Listeners
Is a reputation service that enables you to control the messages that come through the Cisco ESA email gateway based on the sender trustworthiness (reputation)
Cisco SenderBase
Concept of Cisco ESA. This are enable by default and provide a dynamic quarantine (also called delay quarantine).
Outbreak filters
Is a Cisco ESA term that defines which recipients are accepted by a public listener
Recipient Access Table (RAT)
Cisco ESA feature that allows you to secure your sensitive, proprieatry information and intellectual property, preventing this data from leaving your network such ash marketing messages, spam, graymail, malware phishing, confidential data, personally identifiable information (PII)
Cisco ESA Data Loss Protection